Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by
The Art of Attack
Cover
Title Page
Copyright
About the Author
Acknowledgments
Introduction
Who Is This Book For?
What This Book Covers
Part I: The Attacker Mindset
Chapter 1: What Is the Attacker Mindset?
Using the Mindset
The Attacker and the Mindset
AMs Is a Needed Set of Skills
Summary
Chapter 2: Offensive vs. Defensive Attacker Mindset
The Offensive Attacker Mindset
Defensive Attacker Mindset
Summary
Chapter 3: The Attacker Mindset Framework
Development
Ethics
Social Engineering and Security
Summary
Part II: The Laws and Skills
Chapter 4: The Laws
Law 1: Start with the End in Mind
Law 2: Gather, Weaponize, and Leverage Information
Law 3: Never Break Pretext
Law 4: Every Move Made Benefits the Objective
Summary
Chapter 5: Curiosity, Persistence, and Agility
Curiosity
The Exercise: Part 1
The Exercise: Part 2
Persistence
Skills and Common Sense
Summary
Chapter 6: Information Processing: Observation and Thinking Techniques
Your Brain vs. Your Observation
Observation vs. Heuristics
Observation vs. Intuition
Observing People
Observation Exercise
AMs and Observation
Tying It All Together
Critical and Nonlinear Thinking
Vector vs. Arc
Education and Critical Thinking
Workplace Critical Thinking
Critical Thinking and Other Psychological Constructs
Nonlinear Thinking
Tying Them Together
Summary
Chapter 7: Information Processing in Practice
Reconnaissance
Recon: Passive
Recon: Active
OSINT
Signal vs. Noise
Summary
Part III: Tools and Anatomy
Chapter 8: Attack Strategy
Attacks in Action
Strategic Environment
The Necessity of Engagement and Winning
The Attack Surface
AMs Applied to the Attack Vectors
Summary
Chapter 9: Psychology in Attacks
Setting The Scene: Why Psychology Matters
Ego Suspension, Humility & Asking for Help
Introducing the Target‐Attacker Window Model
Target Psychology
Thin‐Slice Assessments
Default to Truth
Summary
Part IV: After AMs
Chapter 10: Staying Protected—The Individual
Attacker Mindset for Ordinary People
Behavioral Security
Amygdala Hijacking
Analyze Your Attack Surface
Summary
Chapter 11: Staying Protected—The Business
Testing and Red Teams
The Complex Policy
Antifragile
The Full Spectrum of Crises
Final Thoughts
Summary
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
The Art of Attack
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset